Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-4480

Опубликовано: 18 мая 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.2
CVSS3: 8.4

Описание

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

РелизСтатусПримечание
devel

not-affected

not a kernel issue, it's a xen only issue
esm-infra-legacy/trusty

not-affected

not a kernel issue, it's a xen only issue
esm-infra/xenial

not-affected

not a kernel issue, it's a xen only issue
precise

not-affected

not a kernel issue, it's a xen only issue
trusty

not-affected

not a kernel issue, it's a xen only issue
trusty/esm

not-affected

not a kernel issue, it's a xen only issue
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

not-affected

not a kernel issue, it's a xen only issue
wily

not-affected

not a kernel issue, it's a xen only issue

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

not a kernel issue, it's a xen only issue
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

not a kernel issue, it's a xen only issue
esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

not-affected

vivid/ubuntu-core

DNE

wily

not-affected

not a kernel issue, it's a xen only issue

Показывать по

РелизСтатусПримечание
devel

not-affected

not a kernel issue, it's a xen only issue
esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

not-affected

not a kernel issue, it's a xen only issue

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

not a kernel issue, it's a xen only issue
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [not a kernel issue, it's a xen only issue]]
precise

DNE

trusty

not-affected

not a kernel issue, it's a xen only issue
trusty/esm

DNE

trusty was not-affected [not a kernel issue, it's a xen only issue]
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [not a kernel issue, it's a xen only issue]]
precise

DNE

trusty

not-affected

not a kernel issue, it's a xen only issue
trusty/esm

DNE

trusty was not-affected [not a kernel issue, it's a xen only issue]
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [not a kernel issue, it's a xen only issue]]
precise

DNE

trusty

not-affected

not a kernel issue, it's a xen only issue
trusty/esm

DNE

trusty was not-affected [not a kernel issue, it's a xen only issue]
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

not a kernel issue, it's a xen only issue
precise

DNE

trusty

not-affected

not a kernel issue, it's a xen only issue
trusty/esm

not-affected

not a kernel issue, it's a xen only issue
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

not a kernel issue, it's a xen only issue
esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

not-affected

vivid/ubuntu-core

DNE

wily

not-affected

not a kernel issue, it's a xen only issue

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

not-affected

not a kernel issue, it's a xen only issue
xenial

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

not a kernel issue, it's a xen only issue
esm-infra-legacy/trusty

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

not-affected

not a kernel issue, it's a xen only issue
wily

not-affected

not a kernel issue, it's a xen only issue
xenial

not-affected

not a kernel issue, it's a xen only issue

Показывать по

РелизСтатусПримечание
devel

not-affected

not a kernel issue, it's a xen only issue
esm-infra-legacy/trusty

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

not-affected

not a kernel issue, it's a xen only issue

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

not a kernel issue, it's a xen only issue
trusty

DNE

trusty/esm

DNE

upstream

not-affected

not a kernel issue, it's a xen only issue
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

released

4.6.0-1ubuntu5
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.6]]
esm-infra/xenial

released

4.6.0-1ubuntu4.1
precise

released

4.1.6.1-0ubuntu0.12.04.11
trusty

released

4.4.2-0ubuntu0.14.04.6
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.6]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

4.5.1-0ubuntu1.4

Показывать по

EPSS

Процентиль: 66%
0.00516
Низкий

7.2 High

CVSS2

8.4 High

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

CVSS3: 8.4
nvd
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

CVSS3: 8.4
debian
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6. ...

CVSS3: 8.4
github
больше 3 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 66%
0.00516
Низкий

7.2 High

CVSS2

8.4 High

CVSS3

Уязвимость CVE-2016-4480